نتایج جستجو برای: rateless codes

تعداد نتایج: 77627  

Journal: :Signal Processing Systems 2012
Hady Zeineddine Mohammad M. Mansour

A Raptor code is a concatenation of a fixed rate precode and a Luby-Transform (LT) code that can be used as a rateless error-correcting code over communication channels. By definition, Raptor codes are characterized by irregularity features such as dynamic rate, check-degree variability, and joint coding, which make the design of hardware-efficient decoders a challenging task. In this paper, se...

2011
Rahul Urgaonkar Keith M. Chugg

We investigate four problems on optimal resource allocation and cross-layer control in cognitive and cooperative wireless networks with time-varying channels. The first three problems consider different models and capabilities associated with cognition and cooperation in such networks. Specifically, the first problem focuses on the dynamic spectrum access model for cognitive radio networks and ...

Journal: :EURASIP J. Wireless Comm. and Networking 2013
Mostafa Asgharpoor Salkuyeh Faramarz Hendessi T. Aaron Gulliver

Vehicular ad hoc networks are an important new class of wireless networks with applications ranging from safety and crash avoidance to Internet access and multimedia distribution. In this article, an efficient method of message dissemination using rateless coding is proposed. Both vehicle-to-vehicle and vehicle-to-infrastructure data transfer are allowed. By employing rateless coding at road si...

Journal: :IET Communications 2011
Hoang Anh Ngo Thanh Dang Nguyen Lajos Hanzo

Systematic Luby transform (SLT) codes constitute rateless codes, which are capable of adaptively adjusting their code rate depending on the channel quality without any explicit channel state information (CSI) at the transmitters. SLTs are also suitable for space time collaboration-aided relay networks. In this study, an iterative decoding-aided SLT scheme is combined with 16 quadrature amplitud...

2017
Attilio Fiandrotti Rossano Gaeta Marco Grangetto

We provide a comprehensive characterization of Band Codes (BC) as a resilient-by-design solution to pollution attacks in Network Coding (NC) based peer-to-peer live video streaming. Consider one malicious node injecting bogus coded packets into the network: the recombinations at the nodes generate an avalanche of novel coded bogus packets. Therefore, the malicious node can cripple the communica...

Journal: :Adv. in MM 2008
Rouzbeh Razavi Martin Fleury Mohammed Ghanbari

Augmented reality (AR) on a head-mounted display is conveniently supported by a wearable wireless network. If, in addition, the AR display is moderated to take account of the cognitive load of the wearer, then additional biosensors form part of the network. In this paper, the impact of these additional traffic sources is assessed. Rateless coding is proposed to not only protect the fragile enco...

2007
Dejan Vukobratović Vladimir Stanković Dino Sejdinović Lina Fagoonee Zixiang Xiong

Digital Fountain (DF) codes were introduced as an efficient and universal Forward Error Correction (FEC) solution for data multicast over lossy packet networks. However, in real-time applications, the DF encoder cannot make use of the “rateless” property as it was proposed in the DF framework, due to its delay constraints. In this scenario, many receivers might not be able to collect enough enc...

Journal: :IEEE Access 2023

Establishing reliable and efficient multicast services in heterogeneous networks under an erasure channel is one of the current priorities coding theory, particularly Network Coding (NC) over data networks. Additionally, increasing number clients with mobile devices high processing capabilities prevalence non-delay tolerant traffic have led to demand for non-feedback schemes regarding distribut...

2012
Heverson Borba Ribeiro

The substantial increase in the amount of information over the Internet has contributed to an extraordinary demand for persistent data storage. Centralized storage architectures are expensive, weakly scalable and vulnerable to attacks as they represent single points of failure in the system. Over last few years, peer-to-peer architectures have emerged as an alternative for implementing persiste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید